<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/d143225c1b7a4e42a7f440635a8da4bf&quot; frameborder=&quot;0&quot; width=&quot;1728&quot; height=&quot;1296&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1296</height><width>1728</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1296</thumbnail_height><thumbnail_width>1728</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/d143225c1b7a4e42a7f440635a8da4bf-d51c93ee6f2ee5db.gif</thumbnail_url><duration>181.4567</duration><title>Navigating the Challenges of Post Quantum Crypto Management</title><description>In this video, I discuss the significant challenge of understanding what&apos;s in our systems, especially after cloud migrations or acquisitions. At Spice Labs, we offer a targeted solution that allows you to survey your systems and manage post-quantum crypto projects effectively, using advanced algorithms like Markle trees. Our extensive graph, which includes 13 billion nodes across Java open source, Debian, and Ubuntu, enables you to pinpoint vulnerabilities with ease. I encourage you to leverage our tools to gain clarity on your systems and chart your course towards enhanced security. Let&apos;s work together to uncover those hidden risks and ensure your systems are robust against emerging threats.</description></oembed>